Detecting unknown malicious code by applying classification techniques on OpCode patterns
暂无分享,去创建一个
Yuval Elovici | Shlomi Dolev | Asaf Shabtai | Robert Moskovitch | Clint Feher | S. Dolev | A. Shabtai | Y. Elovici | Robert Moskovitch | Clint Feher
[1] V. Barnett,et al. Applied Linear Statistical Models , 1975 .
[2] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[3] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[4] Heekuck Oh,et al. Neural Networks for Pattern Recognition , 1993, Adv. Comput..
[5] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[6] Stan Matwin,et al. Addressing the Curse of Imbalanced Training Sets: One-Sided Selection , 1997, ICML.
[7] Thorsten Joachims,et al. Making large-scale support vector machine learning practical , 1999 .
[8] Tom Fawcett,et al. Robust Classification Systems for Imprecise Environments , 1998, AAAI/IAAI.
[9] Robert E. Schapire,et al. A Brief Introduction to Boosting , 1999, IJCAI.
[10] Katharina Morik,et al. Combining Statistical Learning with a Knowledge-Based Approach - A Case Study in Intensive Care Monitoring , 1999, ICML.
[11] J. Mesirov,et al. Molecular classification of cancer: class discovery and class prediction by gene expression monitoring. , 1999, Science.
[12] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .
[13] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[14] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[16] Nathalie Japkowicz,et al. The class imbalance problem: A systematic study , 2002, Intell. Data Anal..
[17] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[18] Foster J. Provost,et al. Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction , 2003, J. Artif. Intell. Res..
[19] Tom Fawcett,et al. Robust Classification for Imprecise Environments , 2000, Machine Learning.
[20] Chao Chen,et al. Using Random Forest to Learn Imbalanced Data , 2004 .
[21] Vlado Keselj,et al. N-gram-based detection of new malicious code , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[22] Stan Matwin,et al. Machine Learning for the Detection of Oil Spills in Satellite Radar Images , 1998, Machine Learning.
[23] Pedro M. Domingos,et al. On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.
[24] Nitesh V. Chawla,et al. Editorial: special issue on learning from imbalanced data sets , 2004, SKDD.
[25] Marcus A. Maloof,et al. Learning to detect malicious executables in the wild , 2004, KDD.
[26] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.
[27] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[28] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[29] Wenke Lee,et al. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[30] Daniel Bilar,et al. Opcodes as predictor for malware , 2007, Int. J. Electron. Secur. Digit. Forensics.
[31] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[32] Christopher Krügel,et al. Limits of Static Analysis for Malware Detection , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[33] Maya Gokhale,et al. Comparison of feature selection and classification algorithms in identifying malicious executables , 2007, Comput. Stat. Data Anal..
[34] Wenke Lee,et al. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[35] Yuval Elovici,et al. Unknown Malcode Detection Using OPCODE Representation , 2008, EuroISI.
[36] Lior Rokach,et al. Detection of unknown computer worms based on behavioral classification of the host , 2008, Comput. Stat. Data Anal..
[37] Joohan Lee,et al. Data mining methods for malware detection using instruction sequences , 2008 .
[38] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[39] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[40] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[41] Lior Rokach,et al. Improving malware detection by applying multi-inducer ensemble , 2009, Comput. Stat. Data Anal..
[42] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[43] Tzi-cker Chiueh,et al. Automatic Generation of String Signatures for Malware Detection , 2009, RAID.
[44] Igor Muttik,et al. Cloud security technologies , 2009, Inf. Secur. Tech. Rep..
[45] Yuval Elovici,et al. Unknown malcode detection and the imbalance problem , 2009, Journal in Computer Virology.
[46] Yoseba K. Penya,et al. Idea: Opcode-Sequence-Based Malware Detection , 2010, ESSoS.
[47] Yuval Elovici,et al. Monitoring, analysis, and filtering system for purifying network traffic of known and unknown malicious content , 2011, Secur. Commun. Networks.